General
-
Target
soler.exe
-
Size
6.0MB
-
Sample
240521-r5w6zahf6x
-
MD5
78b0815a69f61745ad6d13829f770248
-
SHA1
ea0a1909b9444de1069ab6bd981bcd1635b23164
-
SHA256
a0e125db0c9ae88eec78f08128cf7a3250a15c1825891432275623a804212613
-
SHA512
802ec425c170e6128755b3fcfd25deb623a5dc3f59d1dd8eb0b95cda5dc3fa00161211f734baabd4c8bd8f2ee93f838dda5d0230905cf24d4c7006b3cb206daf
-
SSDEEP
98304:GMEtdFBgKG1amaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RFBMUL3OEyTU:G7FDGQeN/FJMIDJf0gsAGK4RFuUgTU
Behavioral task
behavioral1
Sample
soler.exe
Resource
win7-20240215-en
Malware Config
Targets
-
-
Target
soler.exe
-
Size
6.0MB
-
MD5
78b0815a69f61745ad6d13829f770248
-
SHA1
ea0a1909b9444de1069ab6bd981bcd1635b23164
-
SHA256
a0e125db0c9ae88eec78f08128cf7a3250a15c1825891432275623a804212613
-
SHA512
802ec425c170e6128755b3fcfd25deb623a5dc3f59d1dd8eb0b95cda5dc3fa00161211f734baabd4c8bd8f2ee93f838dda5d0230905cf24d4c7006b3cb206daf
-
SSDEEP
98304:GMEtdFBgKG1amaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RFBMUL3OEyTU:G7FDGQeN/FJMIDJf0gsAGK4RFuUgTU
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-